Oblivious polynomial evaluation

被引:4
|
作者
Li, HD [1 ]
Ji, DY [1 ]
Feng, DG [1 ]
Li, B [1 ]
机构
[1] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100039, Peoples R China
关键词
oblivious polynomial evaluation; oblivious transfer; secure multi-party computation; information security;
D O I
10.1007/BF02944757
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of two-party oblivious polynomial evaluation (OPE) is studied, where one party (Alice) has a polynomial P(x) and the other party (Bob) with an input x wants to learn P(x) in such an oblivious way that Bob obtains P(x) without learning any additional information about P except what is implied by P(x) and Alice does not know Bob's input x. The former OPE protocols are based on an intractability assumption except for OT protocols. In fact, evaluating P(x) is equivalent to computing the product of the coefficient vectors (a(0),...,a(n)) and (1,...,x(n)). Using this idea, an efficient scale product protocol of two vectors is proposed first and then two OPE protocols are presented which do not need any other cryptographic assumption except for OT protocol. Compared with the existing OPE protocol, another characteristic of the proposed protocols is the degree of the polynomial is private. Another OPE protocol works in case of existence of untrusted third party. Keywords oblivious polynomial evaluation, oblivious transfer, secure multi-party computation, information.
引用
收藏
页码:550 / 554
页数:5
相关论文
共 50 条
  • [1] Oblivious polynomial evaluation
    Hong-Da Li
    Dong-Yao Ji
    Deng-Guo Feng
    Bao Li
    Journal of Computer Science and Technology, 2004, 19 : 550 - 554
  • [2] Oblivious polynomial evaluation
    Naor, M
    Pinkas, B
    SIAM JOURNAL ON COMPUTING, 2006, 35 (05) : 1254 - 1281
  • [3] Oblivious polynomial evaluation and oblivious neural learning
    Chang, YC
    Lu, CJ
    THEORETICAL COMPUTER SCIENCE, 2005, 341 (1-3) : 39 - 54
  • [4] Oblivious Polynomial Evaluation in the Exponent, Revisited
    Itakura, Naota
    Kurosawa, Kaoru
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 26 - 33
  • [5] Multivariate oblivious polynomial evaluation protocol
    Xiao Mingjun
    Huang Liusheng
    Liu An
    Han Kai
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (02): : 217 - 222
  • [6] Verifiable and Private Oblivious Polynomial Evaluation
    Gajera, Hardik
    Giraud, Matthieu
    Gerault, David
    Das, Manik Lal
    Lafourcade, Pascal
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2019, 2020, 12024 : 49 - 65
  • [7] Unconditionally Secure Distributed Oblivious Polynomial Evaluation
    Cianciullo, Louis
    Ghodosi, Hossein
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 132 - 142
  • [8] Unconditionally secure Oblivious Polynomial Evaluation protocol
    Li Luyao
    Duan Zongtao
    Wang Qinglong
    Wang Jing
    Dai Ming
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED ICT AND EDUCATION, 2013, 33 : 579 - 583
  • [9] Distributed Protocols for Oblivious Transfer and Polynomial Evaluation
    Ben Arie, Aviad
    Tassa, Tamir
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2023, PT II, 2024, 14460 : 62 - 83
  • [10] MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation
    Izabachene, Malika
    Nitulescu, Anca
    de Perthuis, Paola
    Pointcheval, David
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 663 - 686